In the aftermath of the tragic fire that killed three Apollo 1 astronauts in 1967, a US congressional hearing was convened to discuss the cause and what to do about…
Artificial intelligence (AI) has been table stakes in cybersecurity for several years now, but the broad adoption of Large Language Models (LLMs) made 2023 an especially exciting year. In fact,…
Complexity is the bane of all network security teams, and they will attest that the more dashboards, screens, and manual integration which they must juggle, the slower their response time.…
Imagine a world where all of your data—your personal, private, and sensitive data—was availableto anyone. No protection. No coverage. Now imagine that tenfold. Thousands of users’ data outthere for anyone…
Choosing a college requires more than just evaluating the academic program. It also involves finding an ideal location that matches your personal and professional objectives and passions. And amidst the…
This is my reflection on the Cybersecurity in a Global Context program at St. John’s University and its impact on my personal and academic growth. What is the Cybersecurity in…
CrowdStrike data shows that 25% of cloud assets in the U.S. are exposed to severe vulnerabilities — securing the cloud starts with knowing your risk The IT future is a…
The cloud has become the new battleground for adversary activity: CrowdStrike observed a 95% increase in cloud exploitation from 2021 to 2022 and a 288% jump in cases involving threat…
CrowdStrike discovered a vulnerability in Flexera’s FlexNet Inventory Agent that can be exploited to allow arbitrary code execution and privilege escalation under certain conditions. The vulnerability was disclosed to Flexera…
Mitigate the risks of architecture drift with application security posture management Cybercriminals work around the clock to discover new tactics to breach systems. Each time a digital ecosystem changes, it…
Azure cross-tenant synchronization (CTS) was made generally available on May 30, 2023, and introduced a new attack surface on Microsoft Entra ID (formerly Azure Active Directory) where attackers can move laterally to…
As organizations move more of their business-critical applications to the cloud, adversaries are shifting their tactics accordingly. And within the cloud, it’s clear that cybercriminals are setting their sights on…
In the ever-evolving landscape of cloud security, staying ahead of the curve is paramount. Today, we are announcing an exciting enhancement: CrowdStrike Falcon® Cloud Security now supports Google Kubernetes Engine (GKE) Autopilot.…
Securing custom applications in a sea of vulnerabilities is daunting. To make the task even more challenging, the threat to applications continues to grow: 8 out of the top 10 data…
At this year’s Google Cloud Next, CrowdStrike announced an expanded partnership with Google Cloud and a growing list of innovations built to protect cloud environments from modern adversaries and stop…